About me

Samsung

Jumat, 08 Maret 2013

Final Exam CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. What is the default subnet mask for the IP
address 128.107.23.10?* 255.255.0.0

2. When terminating a UTP cable, why is it
important to push the wires all the way into the end of the connector?

*to ensure good
electrical

3. Refer to
the exhibit. The security policy of an organization requires users to change
their password every week. Which type of security policy is this?

* password

4. Two switches are interconnected in the same
wiring closet. What type of cable is typically used for this connection?

*UTP crossover

5. Some new features are available for the OS
that is currently running on a user's PC. What method should be chosen so that
the user can install these new feature sets?

*upgrade

6. Refer to the exhibit. Assume that the command
output is from a wireless DHCP client that is connected to a Linksys integrated
router. What can be deduced from the output?

*The wireless
connection is operational.

7. Which two causes of networking problems are
related to the physical layer? (Choose two.)

*damaged cables and
connectors
*overheated components

TCP/IP data
transmission between the source and destination
host is de-encapsulated in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
8. What is the correct sequence of these
steps?*B, C, D, A *
(almost sure)

9. Which type of network supports DHCP and DNS
services for network users in a network domain?

*ad hoc

10. Which of the following statements best
describes DNS?*DNS servers are
used to map a name to an IP address.

11. A computer joins the network and announces
itself to all hosts on the LAN. What type of message does the computer send
out?*broadcast

12. When NAT is employed in a small office, which
address type is typically used for hosts on the local LAN?

*private IP
addresses

13. How do ISPs obtain public IP addresses?

*They obtain the
addresses from the Internet registry.

14. Which value would be considered the physical
address for data that is sent across an Ethernet segment?

*MAC address

15. What is true about a wireless access point
that is equipped with an omnidirectional antenna?

*radiates the
signal equally in all directions

16. Which wireless protocol is used for
encryption?

*WEP

17. A technician can ping the public registered
IP address of www.cisco.com but cannot successfully ping the URL address
www.cisco.com from a host computer. Which software utility can the technician
use to diagnose the problem?

*Ipconfig

18. Refer to the exhibit. A network technician is
statically assigning an IP address to a PC. The default gateway is correct.
What would be a valid IP address to assign to the host?

*128.107.255.1

19. What two commands can be used to form a new
binding if client information does not agree with the DHCP client table?
(Choose two.)

*ipconfig /release

* ipconfig /renew

20. Which statement accurately describes a
recommended strategy for end users to employ when they interact with a help
desk technician?

*Provide as much
information about the problem as possible.

21. A home user was successfully browsing the
Internet earlier in the day but is now unable to connect. A ping command from a
wireless laptop to a wired PC in the LAN is successful, but the nslookup
command fails to resolve a website address. The user decides to analyze the
LEDs on the Linksys router to verify connectivity. Which LED should be of main
concern in this situation?

*1-4 Ethernet LEDs

22. Refer to the exhibit. An organization needs
to connect PC systems that use private IP addressing to the Internet. The
organization has multiple systems that need to access the Internet, but were
only able to purchase one public IP address. What should be activated on the
Linksys integrated router to achieve this goal?

*NAT

23. What is a function of NAT when it is
configured on a firewall appliance?

*prevents or allows
access to specific application types based on port numbers

24. Which protocol is used to transfer files
among network devices and perform file-management functions?

*FTP

25. Which statement is true concerning stateful
packet inspection?

*Access is
permitted only if it is a legitimate response to a request from an internal
host.

26. Which
network design layer provides a connection point for end user devices to the
network?

*network

27. What two pieces of information should a help
desk technician document while troubleshooting connectivity issues with an end
user? (Choose two.)

*if the user can
ping the default gateway address

*whether the PC
uses dynamic or static IP addressing

28. As an assignment, a computer science student
needs to present data in binary format. What are the two possible values that
the student can use? (Choose two.)

*0

*1

29. Why would a corporate web server be assigned
a public IP address instead of a private IP address?

*The public address can be routed on the
Internet.

30. What are two examples of peripheral output
devices? (Choose two.)

*headphones

*printer

31. Refer to the exhibit. What is the purpose of
assigning a network name of University?

34. After attaching four PCs to the switch ports,
configuring the SSID and setting authentication properties for a small office
network, a technician successfully tests the connectivity of all PCs that are
connected to the switch and WLAN. A firewall is then configured on the device
prior to connecting it to the Internet. What type of network device includes all
of the described features?

*ISR router

35. What is a major characteristic of asymmetric
Internet service?

*Download speeds
are faster than upload speeds.

36. Which two components are necessary for a
wireless client to be installed on a WLAN? (Choose two.)

*wireless NIC

*wireless bridge

37. Which two statements are true about network
applications? (Choose two.)

Microsoft
Word is an example of a network application.

*Network
applications are accessible from a remote computer..

*Network
applications are installed on a network server.

38. Refer to the exhibit. Assume that the
exhibited output is from a host that is connected to a Linksys integrated
router. What is the first thing that should be checked if using a bottom-up
troubleshooting approach?

*the link status
LED on the front of the router

39. or devices that do not autosense, which
connection requires a crossover cable?

*PC port to PC port

40. Which type of computer has an integrated
mouse?

*laptop

41. Which Windows command is used to display the
configured IP address, subnet mask, and default gateway?

*ipconfig

42. Users are complaining that they get no
response from a new application server. What tool would determine if the client
application is successfully connecting to the application on the new server?

*ping

43. Which function is available on the network
when TCP is used as the transport protocol?

*traffic encryption

44. For the second time in a week, workstations
on a LAN are not able to log into the server. The technician fixed the problem
the first time, but cannot remember the steps taken to solve it. What aspect of
the troubleshooting process has the technician neglected?

*documenting the
troubleshooting process

45. What destination IP address is used in a
unicast packet?

*a specific host

46. Refer to the exhibit. Why would a network
administrator use the network mode that is shown?

*to support hosts
that use different 802.11 standards

47. Which of the following are transport layer
protocols of the TCP/IP model? (Choose two.)

*UDP

*TCP

48. A network designer is working with a small
company to determine the network type best suited to the needs of the company.
Which two characteristics could the designer use to describe a peer-to-peer
network to the owner of the company? (Choose two.)

*easy to install

*low cost

49. Which picture
shows a USB port on a PC?

*

50. A user is unable
to send e-mail. To begin troubleshooting this problem, the network technician
uses the browser on the PC and tries to access some popular Internet websites.
Which troubleshooting approach is being followed?